CVE-2025-6044: Files or Directories Accessible to External Parties in Google ChromeOS
An Improper Access Control vulnerability in the Stylus Tools component of Google ChromeOS version 16238.64.0 on the garaged stylus devices allows a physical attacker to bypass the lock screen and access user files by removing the stylus while the device is closed and using the screen capture feature.
AI Analysis
Technical Summary
CVE-2025-6044 is an Improper Access Control vulnerability identified in the Stylus Tools component of Google ChromeOS version 16238.64.0, specifically affecting garaged stylus devices. The vulnerability allows a physical attacker to bypass the device's lock screen and gain unauthorized access to user files. The attack vector involves removing the stylus from the device while it is closed and then exploiting the screen capture feature to access files without authentication. This indicates a flaw in the access control mechanisms governing file and directory permissions when the device is locked, particularly related to stylus interactions. The vulnerability is classified under CWE-287 (Improper Authentication), highlighting that the system fails to properly verify user credentials or device state before granting access. The CVSS v3.1 base score is 6.1 (medium severity), with an attack vector of physical (AV:P), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality and integrity (C:H/I:H), but no impact on availability (A:N). There are no known exploits in the wild and no patches currently available. This vulnerability is significant because it allows direct physical bypass of security controls, potentially exposing sensitive user data without requiring sophisticated technical skills or remote access.
Potential Impact
For European organizations, this vulnerability poses a tangible risk particularly to sectors where ChromeOS devices with stylus support are used in sensitive environments, such as education, government, and corporate offices. The ability to bypass the lock screen and access files physically undermines endpoint security, potentially leading to data breaches involving confidential information, intellectual property, or personal data protected under GDPR. Since the attack requires physical access, the threat is more pronounced in scenarios where devices are left unattended or in shared spaces. The integrity of data can also be compromised, as attackers might modify or exfiltrate files without detection. Although availability is not impacted, the breach of confidentiality and integrity can lead to regulatory penalties, reputational damage, and operational disruptions. The lack of a patch increases the window of exposure, necessitating immediate compensating controls. The medium severity rating reflects the physical access requirement but high impact on data security, making it a critical consideration for organizations with high-value or sensitive data on ChromeOS devices.
Mitigation Recommendations
Beyond generic advice such as applying patches (which are currently unavailable), European organizations should implement strict physical security controls to mitigate this vulnerability. This includes enforcing policies that prevent unattended devices in public or shared environments, using physical locks or secure storage for devices when not in use, and educating users about the risks of leaving devices accessible. Additionally, organizations should consider disabling or restricting the stylus screen capture feature via device management policies if possible, or configuring ChromeOS to require re-authentication for any screen capture or stylus-related actions when the device is locked. Employing endpoint detection and response (EDR) tools that can monitor unusual device interactions or file access patterns may help detect exploitation attempts. Organizations should also maintain an inventory of affected ChromeOS devices and monitor vendor communications for patches or updates. Finally, implementing full disk encryption and strong user authentication mechanisms can reduce the impact of unauthorized file access.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium
CVE-2025-6044: Files or Directories Accessible to External Parties in Google ChromeOS
Description
An Improper Access Control vulnerability in the Stylus Tools component of Google ChromeOS version 16238.64.0 on the garaged stylus devices allows a physical attacker to bypass the lock screen and access user files by removing the stylus while the device is closed and using the screen capture feature.
AI-Powered Analysis
Technical Analysis
CVE-2025-6044 is an Improper Access Control vulnerability identified in the Stylus Tools component of Google ChromeOS version 16238.64.0, specifically affecting garaged stylus devices. The vulnerability allows a physical attacker to bypass the device's lock screen and gain unauthorized access to user files. The attack vector involves removing the stylus from the device while it is closed and then exploiting the screen capture feature to access files without authentication. This indicates a flaw in the access control mechanisms governing file and directory permissions when the device is locked, particularly related to stylus interactions. The vulnerability is classified under CWE-287 (Improper Authentication), highlighting that the system fails to properly verify user credentials or device state before granting access. The CVSS v3.1 base score is 6.1 (medium severity), with an attack vector of physical (AV:P), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality and integrity (C:H/I:H), but no impact on availability (A:N). There are no known exploits in the wild and no patches currently available. This vulnerability is significant because it allows direct physical bypass of security controls, potentially exposing sensitive user data without requiring sophisticated technical skills or remote access.
Potential Impact
For European organizations, this vulnerability poses a tangible risk particularly to sectors where ChromeOS devices with stylus support are used in sensitive environments, such as education, government, and corporate offices. The ability to bypass the lock screen and access files physically undermines endpoint security, potentially leading to data breaches involving confidential information, intellectual property, or personal data protected under GDPR. Since the attack requires physical access, the threat is more pronounced in scenarios where devices are left unattended or in shared spaces. The integrity of data can also be compromised, as attackers might modify or exfiltrate files without detection. Although availability is not impacted, the breach of confidentiality and integrity can lead to regulatory penalties, reputational damage, and operational disruptions. The lack of a patch increases the window of exposure, necessitating immediate compensating controls. The medium severity rating reflects the physical access requirement but high impact on data security, making it a critical consideration for organizations with high-value or sensitive data on ChromeOS devices.
Mitigation Recommendations
Beyond generic advice such as applying patches (which are currently unavailable), European organizations should implement strict physical security controls to mitigate this vulnerability. This includes enforcing policies that prevent unattended devices in public or shared environments, using physical locks or secure storage for devices when not in use, and educating users about the risks of leaving devices accessible. Additionally, organizations should consider disabling or restricting the stylus screen capture feature via device management policies if possible, or configuring ChromeOS to require re-authentication for any screen capture or stylus-related actions when the device is locked. Employing endpoint detection and response (EDR) tools that can monitor unusual device interactions or file access patterns may help detect exploitation attempts. Organizations should also maintain an inventory of affected ChromeOS devices and monitor vendor communications for patches or updates. Finally, implementing full disk encryption and strong user authentication mechanisms can reduce the impact of unauthorized file access.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- ChromeOS
- Date Reserved
- 2025-06-12T21:41:59.445Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 686c1b656f40f0eb72ec2c9b
Added to database: 7/7/2025, 7:09:25 PM
Last enriched: 7/14/2025, 9:06:33 PM
Last updated: 10/7/2025, 1:48:19 PM
Views: 50
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Hackers Stole Data From Public Safety Comms Firm BK Technologies
MediumCVE-2025-11396: SQL Injection in code-projects Simple Food Ordering System
MediumCVE-2025-40889: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Nozomi Networks Guardian
HighCVE-2025-40888: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40887: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.